2017
DOI: 10.11591/ijece.v7i3.pp1293-1298
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Cryptography for Random-key Generation based on ECC Algorithm

Abstract: As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user's data. Many researchers have developed many complex algorithms to maintain security in user's application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers. We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…where 353 C: MAC Function K: Shared Secret Key MAC: Message Authentication Code The integrity of the received message is verified at the receiver end, as the recipient posses the secret key which can be used to generate the authentication code again and thus, comparing it with the one received. A popular form of MAC [2] uses a cryptographic hash function; the secret key can either be given as an input along with the hash or it can be embedded in an existing hash algorithm.…”
Section: = ( )mentioning
confidence: 99%
See 3 more Smart Citations
“…where 353 C: MAC Function K: Shared Secret Key MAC: Message Authentication Code The integrity of the received message is verified at the receiver end, as the recipient posses the secret key which can be used to generate the authentication code again and thus, comparing it with the one received. A popular form of MAC [2] uses a cryptographic hash function; the secret key can either be given as an input along with the hash or it can be embedded in an existing hash algorithm.…”
Section: = ( )mentioning
confidence: 99%
“…Various researches have been reported with enormous protocols of data security in the last few decades [2]. An implementation of Advanced Encryption Standard (AES) algorithm on a microcontroller for securing data in a small scale network has been presented in the past [3].…”
Section: = ( )mentioning
confidence: 99%
See 2 more Smart Citations
“…The pseudo-random term is used in mathematics and computer science to designate a sequence of numbers that approaches a statistically perfect hazard [14][15][16]. By the algorithmic processes used to create it and the sources used, the sequence cannot be completely considered as truly random.…”
Section: Definition Of a Pseudo-random Sequencementioning
confidence: 99%